Proton blog

  • Privacy basics
What is end-to-end encryption and how does it work?
Read more about What is end-to-end encryption and how does it work?

All the latest

The desire for an internet that protects people’s privacy is growing. A 2019 Pew Research poll showed that 79% of Americans report being concerned about how companies use their data. But any privacy reforms that don’t address Big Tech’s dominance of
The clock may be ticking on Google, Apple, and other tech giants’ ability to impose their email apps on users as default settings. If EU regulators are serious about fair competition in digital markets, letting people choose their own email app shoul
Last updated 2 February 2022 On 2 July 2020, the Senate Judiciary Committee voted to approve the EARN IT Act (an acronym that stands for Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2020). It then died, never receiving

End-to-end encryption is the most secure way to communicate privately and securely online. By encrypting messages at both ends of a conversation, end-to-end encryption prevents anyone in the middle from reading private communications. Until recently
Short Message Service (SMS), also known simply as text messaging, has been with us since the birth of mobile phones (the first-ever text message was sent over the Vodaphone network in 1992).  SMS is supported by almost every mobile network provider
Email protocols explained IMAP and SMTP are protocols used by email clients to send and receive emails.  POP3 is a legacy standard that is used less and less often these days. * SMTP * IMAP * POP3 * APIs * Proton Mail and SMTP, IMAP, and POP3

Privacy deep dives

See all Privacy deep dives
DNA companies are using, sharing, and profiting from millions of people’s genetic data in ways they can’t always control. Genetic testing companies have become very popular in the last decade as people seek to find out who they are and where their a
Fingerprinting is a way to identify you on the internet and can be very hard to prevent. In this article, we discuss what fingerprinting is, and how to reduce your fingerprint. * What is browser fingerprinting? * What is device fingerprinting? *
In 2017, hackers stole the private financial records of some 156 million people from servers belonging to Equifax, while the 2018 Facebook-Cambridge Analytica scandal revealed how personal data belonging to up to 87 million Facebook users was harvest